Sciweavers

88
Voted
NDSS
2015
IEEE
9 years 11 months ago
Bloom Cookies: Web Search Personalization without User Tracking
—We propose Bloom cookies that encode a user’s profile in a compact and privacy-preserving way, without preventing online services from using it for personalization purposes. ...
Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatow...
NDSS
2015
IEEE
9 years 11 months ago
Too LeJIT to Quit: Extending JIT Spraying to ARM
Abstract—In the face of widespread DEP and ASLR deployment, JIT spraying brings together the best of code injection and code reuse attacks to defeat both defenses. However, to da...
Wilson Lian, Hovav Shacham, Stefan Savage
93
Voted
NDSS
2015
IEEE
9 years 11 months ago
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity
—We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity ...
Stephen Crane, Andrei Homescu, Stefan Brunthaler, ...
88
Voted
NDSS
2015
IEEE
9 years 11 months ago
Phoneypot: Data-driven Understanding of Telephony Threats
—Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to craft attacks that are being used to scam unsuspecting users who have traditionally...
Payas Gupta, Bharath Srinivasan, Vijay Balasubrama...
117
Voted
NDSS
2015
IEEE
9 years 11 months ago
Opaque Control-Flow Integrity
Abstract—A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launch...
Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kev...